SlideShare a Scribd company logo
1 of 10
Submitted to :-
Nikhar Bhatnagar
Submitted by :-
Anuj Chaturvedi
1
PRESENTATION
ON
“CYBER CRIME
AND
CHILD PRONOGRAPHY”
POORNIMA GROUP OF INSTITUTIONS, JAIPUR
DEPARTMENT OF COMPUTER SCIENCE
POORNIMA GROUP OF INSTITUTIONS
BT-1, BT PARK SITAPURA
JAIPUR (Raj.)-302022
Walkthrough
Introduction
Types of Cyber Crime
Child Pornography
Safety tips
3
INTRODUCTION
Cyber crime refers to any crime that
involves a computer/mobile and a network.
The computer may have been used in the
commission of a crime, or it may be the
target
Cyber crime is an activity done using
computers and internet. We can say that it is
an unlawful acts wherein the computer
either a tool or target or both.
 A total number of 90, 119, 252 and 219 Government websites tracked by
the Indian Computer Emergency Response Team (CERT-In) were hacked
by various hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011
respectively.
Types of Cyber attacks (source- FBI)
 Computer as a Target : using a computer to attack other computers
e.g. Hacking, virus/worms attacks etc.
 Computer as a Weapon : using a computer to commit real world crimes.
e.g. Cyber terrorism, Child pornography etc.
◦ Financial fraud 11%
◦ Cyber threats(Theft of information) 20%
◦ Cyber Warfare 25%
◦ Drug Trafficking 27%
◦ Cyber Terrorism &extortion 71%
◦ Child Pornography 79%
◦ Viruses 85%
The Internet is being highly used
by its abusers to reach and abuse
children sexually, worldwide. As
more homes have access to
internet, more children would be
using the internet and more are the
chances of falling victim to the
aggression of pedophiles.
Writings, pictures, films, etc.
designed to stimulate sexual
excitement
History of Internet Pornography
 February 1993 – The internet is
made public
 March 1993 – The largest child
pornography investigation in
history begins
 1995 – A study is conducted that
said that about 80% of internet
usage is from pornography
How they operate
They operate Pedophiles use false identity to trap
the children , Pedophiles connect children in
various chat rooms which are used by children to
interact with other children.
Cont..
 2004 – China attempts to
ban internet pornography
 2009 – Media Streaming
is improved and
bandwidth costs drop
Use antivirus
software and
insert
firewalls
uninstall
unnecessary
software
maintain
backup and
check
security
settings`
Stay
anonymous -
choose a
genderless
screen name
Queries
10

More Related Content

What's hot (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)Cyber pornograpghy (with special reference to child pornography)
Cyber pornograpghy (with special reference to child pornography)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Viewers also liked

2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child PornographyFrederick Lane
 
PPT on Child labor
PPT on Child labor PPT on Child labor
PPT on Child labor Mv Raam
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornographyOmar Jacalne
 
presentation on child labour
presentation on child labourpresentation on child labour
presentation on child labourshahriar786
 
Child labour
Child labourChild labour
Child labourMSIT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
ppt on child labour
ppt on child labourppt on child labour
ppt on child labourAditya Kumar
 

Viewers also liked (12)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography
 
Child labour
Child labourChild labour
Child labour
 
PPT on Child labor
PPT on Child labor PPT on Child labor
PPT on Child labor
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Anti child pornography
Anti child pornographyAnti child pornography
Anti child pornography
 
presentation on child labour
presentation on child labourpresentation on child labour
presentation on child labour
 
Child labour
Child labourChild labour
Child labour
 
Child labour-child-labour-project
Child labour-child-labour-projectChild labour-child-labour-project
Child labour-child-labour-project
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
ppt on child labour
ppt on child labourppt on child labour
ppt on child labour
 
Child labour presentation
Child labour presentationChild labour presentation
Child labour presentation
 

Similar to ppt on child pornography and cyber crime

Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanaomar timawa
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world? Dipak Parmar
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitySohailAkbar14
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...Lisa Muthukumar
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxVincentAcapen
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptxangellaclarianes1
 

Similar to ppt on child pornography and cyber crime (20)

CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber crime on education rmindanao
Cyber crime on education rmindanaoCyber crime on education rmindanao
Cyber crime on education rmindanao
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world?
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Opportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptxOpportunities, Challenges and Power of Media and Information lessons.pptx
Opportunities, Challenges and Power of Media and Information lessons.pptx
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 

Recently uploaded (20)

POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 

ppt on child pornography and cyber crime

  • 1. Submitted to :- Nikhar Bhatnagar Submitted by :- Anuj Chaturvedi 1 PRESENTATION ON “CYBER CRIME AND CHILD PRONOGRAPHY” POORNIMA GROUP OF INSTITUTIONS, JAIPUR DEPARTMENT OF COMPUTER SCIENCE POORNIMA GROUP OF INSTITUTIONS BT-1, BT PARK SITAPURA JAIPUR (Raj.)-302022
  • 2. Walkthrough Introduction Types of Cyber Crime Child Pornography Safety tips
  • 3. 3 INTRODUCTION Cyber crime refers to any crime that involves a computer/mobile and a network. The computer may have been used in the commission of a crime, or it may be the target Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.
  • 4.  A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked by various hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively.
  • 5. Types of Cyber attacks (source- FBI)  Computer as a Target : using a computer to attack other computers e.g. Hacking, virus/worms attacks etc.  Computer as a Weapon : using a computer to commit real world crimes. e.g. Cyber terrorism, Child pornography etc. ◦ Financial fraud 11% ◦ Cyber threats(Theft of information) 20% ◦ Cyber Warfare 25% ◦ Drug Trafficking 27% ◦ Cyber Terrorism &extortion 71% ◦ Child Pornography 79% ◦ Viruses 85%
  • 6. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles. Writings, pictures, films, etc. designed to stimulate sexual excitement
  • 7. History of Internet Pornography  February 1993 – The internet is made public  March 1993 – The largest child pornography investigation in history begins  1995 – A study is conducted that said that about 80% of internet usage is from pornography
  • 8. How they operate They operate Pedophiles use false identity to trap the children , Pedophiles connect children in various chat rooms which are used by children to interact with other children. Cont..  2004 – China attempts to ban internet pornography  2009 – Media Streaming is improved and bandwidth costs drop
  • 9. Use antivirus software and insert firewalls uninstall unnecessary software maintain backup and check security settings` Stay anonymous - choose a genderless screen name